SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does Windows XP Mode requires?
The Application Identity Service
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
2. What is Optimize for Consistency polling mode do?
Use dnscmd /recorddelete
A new Microsoft proprietary file system supported in Windows 7 which is intended for flash drives but often called FAT64 - limit of 264 bytes (16 Exabytes).
Use IPCONFIG or Status Details for the Network Connection.
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
3. What is a ESP?
Used to get a list of installed 3rd party drivers
Encapsulating Security payload protocol used for encryption the packets created by the AH.
Configure the enforcement points as RADIUS clients.
A CONFIG.XML file
4. What is Network Level Authentication?
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
Default Programs Control Panel applet
5. How do you manage EFS from the command line?
Use the Cipher.exe command line tool.
Internet printing protocol. Used for connecting to printers via web browser.
Use the Import Foreign Disk option on the target computer
It insert drivers into the Windows Driver Store so that users can add the associated PNP hardware without having to provide the driver or administrator credentials
6. How do you move a Dynamic Disk from one computer to another?
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
Using wecutil -cs in an xml file.
Use the Import Foreign Disk option on the target computer
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
7. What is WinRS?
It makes it easy to share your libraries and printers on a home network. You can share pictures - music - videos - documents - and printers with other people in your homegroup. The homegroup is protected with a password - and you'll always be able to
It is a command-line tool which relies on Windows Remote Management (WinRM) to execute remote commands. The basic syntax for WinRS commands is as follows: winrs -r:target command - where target is the name (NetBIOS or FQDN) of the remote computer tha
It sees if your PC is ready for Windows 7. It scans your hardware - devices - and installed programs for known compatibility issues - gives you guidance on how to resolve potential issues found - and recommends what to do before you upgrade.
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
8. What must you do if DHCP is not installed on the same computer as the RADIUS server?
Install NAP on the computer with the DHCP service.Configure NAP as a RADIUS proxy and forward connection requests to the RADIUS server.
Turn off the Log Spooler event on a print server.
Modify/Create a GPO
Yes
9. What has Windows 7 modified in searching?
It improves performance
Increase the minimum size of your paging file. Windows sets the initial minimum size of the paging file equal to the amount of random access memory (RAM) installed on your computer plus 300 megabytes (MB) - and the maximum size equal to three times t
Schedule reports - monitor attempt to save unauthorized files - and generate reports instantly.
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
10. What extensions is Firewall rules can be exported and imported?
It designates an authoritative DNS server - not the soa record.
A .WFW file
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
It pings with IPV6
11. What is the benifit of create a fixed size VHD instead of a dynamically expanding VHD file?
Netsh set dnsserver. Example: netsh interface ipv4 set dnsserver name="Local Area Connection" source=static address=192.168.0.100
Backups of the full system including all critical volumes (volumes that contain operating system state).
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
It improves performance
12. How can you can upgrade an offline image's Windows 7 edition?
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
Setup a GlobalNames zone.
It lets you launch process on a remote machine via command line. Example: winrs -r:(remotehost) ipconfig /all
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
13. What does the PSCONSOLEFILE option in POWERSHELL do?
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
Create a customized shell
A roecord to indicate the smtp server.
DHCPv6 obtains additional configuration settigns.
14. What do you do if you install an older operating AFTER you install Windows 7?
No they are disabled
They must be configured with the ip addresses of the radius server.
Delete all the zone files or reinstall the DNS service.
You will need to run "Startup Repair" from within the Windows Recovery Environment (WRE)
15. How do you reload an active directory integrated zone from a ad database?
Us edit dnscmd /zoneupdatefromdns command.
Uncheck IPV6 from the network properties.
Sent across the network
Configure a GPO to modify the computers location to look for updates.
16. How do you secure a WSUS connection to a remote SQL server?
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
IPSEC
17. What do you do if a computer is missing the data recovery agent certificate for the EFS recovery agent?
A LAN Router only or a LAN to WAN Router
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
vssadmin.exe. This can view previous version files as well.
Export and import it from another computer.
18. What is BCD?
Windows 7 Enterprise and Ultimate Editions
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
Use the "Connect to a Workplace" option
19. What protocol does Ping uses?
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
Increase the SOA refresh interval parameter.
The ICMP protocol.
Comes with the Windows Automated Installation Kit (WAIK)
20. How do you troubleshoot DHCP client address assignment using the network monitor?
Boot the computer with a WINDOWS PE disk that contains a copy of IMAGEX.
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
Se a capture filter based on the mac address of the problem PC.
It is the authentication header protocol and digitally sign packets but not encrypt them.
21. Why is PKi needed to encypt vpn traffic?
Ping the Link Local Address (FE80 Address)
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
22. Direct Access requires...
Computer certificates be installed on client computers
Attach to the VHD file created by Windows Backup. You can attach to a VHD file using Disk Management or DISKPART
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
Expose a WIM file contents through Windows Explorer. You can run BCDEDIT.EXE against the mounted image to create or modify the image's boot configuration database.
23. You cannot delete an individual restore point - but you can either delete all restore points or all but the most recent restore point. Deleting restore points temporarily frees up disk space. As new restore points are created - disk space will be use
Use dnscmd /zonerefresh.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
The domain profile not the public or private.
24. What does WINRM QUICKCONFIG do?
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
IN the WindowsUpdateClient log in the system log portion of event viewer.
Divide up a large WIM file into multiple smaller .SWM files
25. How many bits are in the GLOBAL/UNIQUE LOCAL prefix?
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
Configure a firewall rule to the specific port and block all connections.
They are in the first 48 bits /48
26. What is IPP?
Restrict when a child can logon to a computer.
They need to be configured us use 802.1x RADIUS authentication
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
Internet printing protocol. Used for connecting to printers via web browser.
27. What is AppLocker?
When you plug a ReadyBoost-compatible storage device into your computer - the AutoPlay dialog box offers you the option to speed up your PC using ReadyBoost. If you select this option - you can choose how much memory on the device to use for this pur
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
Schedule reports - monitor attempt to save unauthorized files - and generate reports instantly.
You start by selecting Windows XP Mode from the Windows 7 Start Menu. You can install applications in Windows XP Mode just as you normally would on a physical PC. For example - you can install applications via web - from storage devices - or from phy
28. What should you modify of the NAP Agent client service if the computer needs to prove health status?
Run scripts
Clear the content being cached
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
By using the dnscmd /zoneexport command.
29. Who can run the Windows Easy Transfer Wizard?
Only a local administrator
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
30. How can you communicate accross the IPV6 accross a IPV4 network?
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
31. What is a Subscription in event viewer?
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
Use Safe Mode and then roll back the driver if it was recently updated.
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
A collection of logs created by computers fowarding events. Viewed on the collecting computer.
32. What does the MigDocs.xml file do?
Can be used to create virtual hard disks
This happens because the zone records expire. This occurs because the secondary zone has not successfully zone transferred before the "Expires After" SOA.
Use AD integrated zones so the clients can update to more than one DNS server.
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
33. Does the Advanced Firewall already has a predefined Homegroup inbound rule?
ISATAP - Teredo and 6to4
Yes - it can be modified to apply to a network location.
It makes it easy to share your libraries and printers on a home network. You can share pictures - music - videos - documents - and printers with other people in your homegroup. The homegroup is protected with a password - and you'll always be able to
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
34. Are Migrated user accounts are enabled by default?
It create a report of which files will be migrated
Adds a file based zone
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
No they are disabled
35. What do you modify to define CD Autoplay settings and file associations?
Using wecutil -cs in an xml file.
Default Programs Control Panel applet
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
36. What needs to be enabled for smart card logon?
EAP authentication needs to be enabled for remote access authentication (dial up - VPN - wireless) -.
Command to configure the TCP/IP settings.
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
By unbinding the DHCP protocol from the nic attached to the subnet.
37. How do you create a custom Windows PE image that supports windows scripting host?
In the registry. To bind to another computer remotly the remote registry service needs to run on the target PC.
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
Does not
38. What is the difference between MSCHAP2 and EAP-TLS?
WPA-Enterprise (radius authentication)
Used to get a list of installed 3rd party drivers
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
Encapsulating Security payload protocol used for encryption the packets created by the AH.
39. What service has to be started for Applocker to work?
BCD boot file creation and repair tool. The bcdboot.exe command-line tool is used to copy critical boot files to the system partition and to create a new system BCD store.
The Application Identity Service
Run Disk Cleanup and click Clean up system files. If you are prompted for an administrator password or confirmation - type the password or provide confirmation. Click the More Options tab - under System Restore and Shadow Copies - click Clean up. In
A CONFIG.XML file
40. What does "wbdadmin -startbackup -allcritical" do?
Suggested Sites
Backups of the full system including all critical volumes (volumes that contain operating system state).
Use the Import Foreign Disk option on the target computer
A .WFW file
41. What is jetpack.exe?
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
They are monitored but not enforced. Users can exced there quota limit.
Delegate permission by configuring the dacl of the zone file.
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
42. What can In-Private Browsing not display?
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
A CONFIG.XML file
they are enforced and will not allow a user to exceed the space limit.
Suggested Sites
43. Where must SSL certificates must be issued by?
Computer certificates be installed on client computers
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
ImageX utility can extract the required operating system edition directly to the attached VHD file in Windows 7.
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
44. What controlls file extensions?
vssadmin.exe. This can view previous version files as well.
The Default Programs Control Panel applet
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Windows Aero was revised to be more touch-friendly.
45. What does the WSUS DB Store?
The import and export affects the entire policy. For example - if you export a policy - all of the rules from all of the rule collections are exported - including the enforcement settings for the rule collections. If you import a policy - the existin
It is submitted to Microsoft for "device signing" to ensure the driver was adequately tested and will not affect the integrity of the operating system. Critical files are digitally signed so that any changes to these may be easily detected. However n
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
WSUS server configuration information - Metadata describing what each update is for - and general information about clients - updates and interaction.
46. What does Scanstate /EFS:COPYRAW do?
Migrates EFS encrypted files?
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
47. What does DirectAccess uses to authenticate?
Pool Active Directory.
Use IPCONFIG or Status Details for the Network Connection.
IPsec to authenticate both the computer and user - allowing IT to manage the computer before the user logs on. Optionally - you can require a smart card for user authentication. It also leverages IPsec to provide encryption for communications across
Specify this file with both the ScanState and LoadState tools to migrate all user folders and files that resides on the root of any drive and in the Users directory. However - it does not find and migrate any application data - program files - or any
48. Windows firewall can be configured to ___________.
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
Drop both inbound and outbound traffic
A feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points - which are created just befo
Delete all the zone files or reinstall the DNS service.
49. What sites support Integrated Windows Authentication?
Add an AD integrated zone
Only sites added to the local Intranet Zones
DHCPv6 obtains additional configuration settigns.
SP3
50. How do you make a Windows 7 Answer File used for unattended setup?
The DFS service attempts to keep the domain based namespace highly consistent by polling the pcd emulator after the namespace changes. This bypasses the needing to wait for the ad replication to update the namespace object. This can increase load on
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
You setup one the DHCP server with the same option settings and non-overlapping scopes. Make sure to duplicate any reservations.